必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): San Jose

省份(region): California

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       149.104.0.0 - 149.104.255.255
CIDR:           149.104.0.0/16
NetName:        COGENT-149-104-16
NetHandle:      NET-149-104-0-0-1
Parent:         NET149 (NET-149-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Cogent Communications, LLC (COGC)
RegDate:        1992-02-03
Updated:        2025-09-23
Ref:            https://rdap.arin.net/registry/ip/149.104.0.0



OrgName:        Cogent Communications, LLC
OrgId:          COGC
Address:        2450 N Street NW
City:           Washington
StateProv:      DC
PostalCode:     20037
Country:        US
RegDate:        2000-05-30
Updated:        2025-09-23
Comment:        Geofeed https://geofeed.cogentco.com/geofeed.csv
Ref:            https://rdap.arin.net/registry/entity/COGC

ReferralServer:  rwhois://rwhois.cogentco.com:4321

OrgAbuseHandle: COGEN-ARIN
OrgAbuseName:   Cogent Abuse
OrgAbusePhone:  +1-877-875-4311 
OrgAbuseEmail:  abuse@cogentco.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/COGEN-ARIN

OrgNOCHandle: ZC108-ARIN
OrgNOCName:   Cogent Communications
OrgNOCPhone:  +1-877-875-4311 
OrgNOCEmail:  noc@cogentco.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/ZC108-ARIN

OrgTechHandle: IPALL-ARIN
OrgTechName:   IP Allocation
OrgTechPhone:  +1-877-875-4311 
OrgTechEmail:  ipalloc@cogentco.com
OrgTechRef:    https://rdap.arin.net/registry/entity/IPALL-ARIN

# end


# start

NetRange:       149.104.64.0 - 149.104.127.255
CIDR:           149.104.64.0/18
NetName:        BEDGE-CGNT-NET-1
NetHandle:      NET-149-104-64-0-1
Parent:         COGENT-149-104-16 (NET-149-104-0-0-1)
NetType:        Reallocated
OriginAS:       
Organization:   BEDGE CO LIMITED (BL-1081)
RegDate:        2023-05-26
Updated:        2023-05-26
Ref:            https://rdap.arin.net/registry/ip/149.104.64.0


OrgName:        BEDGE CO LIMITED
OrgId:          BL-1081
Address:        1117 CUSTIS PL
Address:        PHILADELPHIA, PA 19122-4141
City:           PHILADELPHIA
StateProv:      PA
PostalCode:     19122-4141
Country:        US
RegDate:        2023-03-22
Updated:        2024-03-25
Comment:        Geofeed https://www.bedge.com/geofeed.csv
Ref:            https://rdap.arin.net/registry/entity/BL-1081


OrgTechHandle: FELIC24-ARIN
OrgTechName:   Felicia, Felicia 
OrgTechPhone:  +1-267-670-0790 
OrgTechEmail:  NOC@bedge.com
OrgTechRef:    https://rdap.arin.net/registry/entity/FELIC24-ARIN

OrgAbuseHandle: FELIC24-ARIN
OrgAbuseName:   Felicia, Felicia 
OrgAbusePhone:  +1-267-670-0790 
OrgAbuseEmail:  NOC@bedge.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/FELIC24-ARIN

# end


# start

NetRange:       149.104.68.0 - 149.104.68.255
CIDR:           149.104.68.0/24
NetName:        LIGHTNODE-US
NetHandle:      NET-149-104-68-0-1
Parent:         BEDGE-CGNT-NET-1 (NET-149-104-64-0-1)
NetType:        Reassigned
OriginAS:       
Customer:       Lightnode-US (C09580526)
RegDate:        2023-05-30
Updated:        2025-08-15
Ref:            https://rdap.arin.net/registry/ip/149.104.68.0


CustName:       Lightnode-US
Address:        the United States,Silicon Valley
City:           Silicon Valley
StateProv:      CA
PostalCode:     94087
Country:        US
RegDate:        2023-05-30
Updated:        2025-08-15
Ref:            https://rdap.arin.net/registry/entity/C09580526

OrgTechHandle: FELIC24-ARIN
OrgTechName:   Felicia, Felicia 
OrgTechPhone:  +1-267-670-0790 
OrgTechEmail:  NOC@bedge.com
OrgTechRef:    https://rdap.arin.net/registry/entity/FELIC24-ARIN

OrgAbuseHandle: FELIC24-ARIN
OrgAbuseName:   Felicia, Felicia 
OrgAbusePhone:  +1-267-670-0790 
OrgAbuseEmail:  NOC@bedge.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/FELIC24-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



Found a referral to rwhois.cogentco.com:4321.

%rwhois V-1.5:0010b0:00 rwhois.cogentco.com (CGNT rwhoisd 1.2.2)
network:ID:NET4-9568400012
network:Network-Name:NET4-9568400012
network:IP-Network:149.104.64.0/18
network:Org-Name:BEDGE CO LIMITED
network:Street-Address:9 GREAT OAKS BOULEVARD
network:City:SAN JOSE
network:State:CA
network:Country:US
network:Postal-Code:95119
network:Tech-Contact:ZC108-ARIN
network:Updated:2025-05-06 17:47:54
%ok
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.104.68.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57467
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.104.68.52.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026031400 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 15 02:19:46 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
Host 52.68.104.149.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 52.68.104.149.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.209.0.90 attackspam
02/09/2020-13:17:39.394797 185.209.0.90 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-02-09 21:12:48
113.21.112.236 attackspambots
Feb  9 05:32:19 localhost sshd\[3725\]: Invalid user admin from 113.21.112.236 port 50849
Feb  9 05:32:19 localhost sshd\[3725\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.21.112.236
Feb  9 05:32:21 localhost sshd\[3725\]: Failed password for invalid user admin from 113.21.112.236 port 50849 ssh2
...
2020-02-09 20:53:36
220.136.20.139 attackbotsspam
23/tcp
[2020-02-09]1pkt
2020-02-09 20:41:48
85.132.100.24 attackbotsspam
Feb  9 13:42:00 MK-Soft-VM3 sshd[13580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.132.100.24 
Feb  9 13:42:02 MK-Soft-VM3 sshd[13580]: Failed password for invalid user hma from 85.132.100.24 port 38626 ssh2
...
2020-02-09 20:45:18
171.228.143.70 attack
2020-02-0905:48:021j0eVl-0001no-B4\<=verena@rs-solution.chH=\(localhost\)[123.22.133.205]:60736P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:verena@rs-solution.chS=2212id=3E3B8DDED5012F9C40450CB4407E89CE@rs-solution.chT="maybeit'sfate"forposttaylor69@gmail.com2020-02-0905:45:541j0eTh-0001iW-PS\<=verena@rs-solution.chH=\(localhost\)[14.169.165.38]:36823P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:verena@rs-solution.chS=2258id=383D8BD8D307299A46430AB24608E45B@rs-solution.chT="areyoulonelytoo\?"fortykoonmenlo@gmail.com2020-02-0905:47:221j0eV6-0001mY-HE\<=verena@rs-solution.chH=\(localhost\)[171.228.143.70]:47553P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:verena@rs-solution.chS=2184id=5154E2B1BA6E40F32F2A63DB2F93E414@rs-solution.chT="lonelinessisnothappy"forrkatunda10@gmail.com2020-02-0905:46:161j0eU3-0001j3-4Q\<=verena@rs-solution.chH=\(localhost\)[113.21.112.236]:35796P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dov
2020-02-09 20:55:52
111.243.156.21 attackspambots
Unauthorized connection attempt detected from IP address 111.243.156.21 to port 23
2020-02-09 20:56:26
45.74.217.105 attack
Honeypot attack, port: 5555, PTR: broadband-user.acndigital.net.
2020-02-09 21:17:46
212.64.40.86 attackbotsspam
Feb  9 07:13:54 Ubuntu-1404-trusty-64-minimal sshd\[20553\]: Invalid user yta from 212.64.40.86
Feb  9 07:13:54 Ubuntu-1404-trusty-64-minimal sshd\[20553\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.40.86
Feb  9 07:13:56 Ubuntu-1404-trusty-64-minimal sshd\[20553\]: Failed password for invalid user yta from 212.64.40.86 port 36060 ssh2
Feb  9 07:24:55 Ubuntu-1404-trusty-64-minimal sshd\[25437\]: Invalid user bj from 212.64.40.86
Feb  9 07:24:55 Ubuntu-1404-trusty-64-minimal sshd\[25437\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.40.86
2020-02-09 20:40:38
88.202.190.151 attackspam
02/09/2020-05:48:06.176907 88.202.190.151 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-02-09 20:59:21
107.180.71.116 attack
Automatic report - XMLRPC Attack
2020-02-09 20:40:55
181.49.47.190 attackbots
** MIRAI HOST **
Sun Feb  9 03:45:17 2020 - Child process 45996 handling connection
Sun Feb  9 03:45:17 2020 - New connection from: 181.49.47.190:35055
Sun Feb  9 03:45:17 2020 - Sending data to client: [Login: ]
Sun Feb  9 03:45:17 2020 - Got data: root
Sun Feb  9 03:45:18 2020 - Sending data to client: [Password: ]
Sun Feb  9 03:45:18 2020 - Got data: cat1029
Sun Feb  9 03:45:20 2020 - Child 45996 exiting
Sun Feb  9 03:45:20 2020 - Child 45997 granting shell
Sun Feb  9 03:45:20 2020 - Sending data to client: [Logged in]
Sun Feb  9 03:45:20 2020 - Sending data to client: [Welcome to MX990 Embedded Linux]
Sun Feb  9 03:45:20 2020 - Sending data to client: [[root@dvrdvs /]# ]
Sun Feb  9 03:45:20 2020 - Got data: enable
system
shell
sh
Sun Feb  9 03:45:20 2020 - Sending data to client: [Command not found]
Sun Feb  9 03:45:20 2020 - Sending data to client: [[root@dvrdvs /]# ]
Sun Feb  9 03:45:20 2020 - Got data: cat /proc/mounts; /bin/busybox WUEWA
Sun Feb  9 03:45:20 2020 - Sending data to client:
2020-02-09 21:13:19
93.174.95.110 attackbotsspam
Feb  9 13:48:00 debian-2gb-nbg1-2 kernel: \[3511717.416809\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=93.174.95.110 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=4540 PROTO=TCP SPT=44975 DPT=4134 WINDOW=1024 RES=0x00 SYN URGP=0
2020-02-09 21:09:47
106.0.7.201 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-09 21:19:39
171.38.146.149 attackbotsspam
[portscan] tcp/23 [TELNET]
*(RWIN=8821)(02091251)
2020-02-09 21:02:26
186.232.236.223 attackspambots
unauthorized connection attempt
2020-02-09 20:42:20

最近上报的IP列表

27.14.175.204 176.9.84.79 98.87.188.21 52.177.253.131
39.101.93.230 220.246.89.110 38.174.148.209 98.81.197.66
220.176.7.132 121.63.130.51 111.230.213.46 87.106.91.226
58.212.237.253 180.153.236.71 180.153.236.104 124.117.193.63
85.137.48.194 58.19.107.14 46.35.171.233 123.178.210.99